Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Stevens Institute Of Technology CS 550 Chapter 13: Ethernet and TCP/IP Networking 1 )The TCP/IP and OSI models are conceived and implemented as a hierarchical                                               , in which each layer at the sending node contributes information that will be used by the corresponding peer layer at the receiving node

Stevens Institute Of Technology CS 550 Chapter 13: Ethernet and TCP/IP Networking 1 )The TCP/IP and OSI models are conceived and implemented as a hierarchical                                               , in which each layer at the sending node contributes information that will be used by the corresponding peer layer at the receiving node

Computer Science

Stevens Institute Of Technology

CS 550

Chapter 13: Ethernet and TCP/IP Networking

1 )The TCP/IP and OSI models are conceived and implemented as a hierarchical                                               , in which each

layer at the sending node contributes information that will be used by the corresponding peer layer at the receiving node.

    1. rank structure
    2. protocol stack
    3. proprietary stack
    4. communication levels

 

 

  1. Which of the following is not part of the TCP/IP protocol suite?
    1. http
    2. ftp
    3. SMS
    4. ssh

 

 

  1. A data packet in an Ethernet network is called a(n)
    1. pack.
    2. frame.
    3. envelope.
    4. container.

 

 

  1. The data link layer is divided into                                           and                                   sublayers.
    1. medium access control; logical link control
    2. physical access control; logical link control
    3. medium access control; virtual link control
    4. physical access control; virtual link control

 

 

  1. A                                      occurs when multiple nodes access and send data simultaneously in such a way that their messages become mixed together and garbled.
    1. conflict
    2. collision
    3. confrontation
    4. commingling

 

 

  1. Switched Ethernet does not actually implement the                                               protocol, because connections are point-to-point and messages can’t become mixed together and garbled.
    1. ARP

 

    1. L2TP
    2. HDLC
    3. CSMA/CD

 

 

  1. What protocol is used to discover the relation between an IP address and a corresponding MAC address?
    1. ARP
    2. L2TP
    3. HDLC
    4. CSMA/CD

 

 

  1. The amount of time that it takes for a packet to get from one end of the network to the other is called the
    1. furthest node travel time.
    2. network broadcast delay.
    3. network propagation delay.
    4. network diameter delay time.

 

 

  1. The                                is responsible for the addressing and routing of packets from the source end node through intermediate nodes, step by step, to their proper final destination.
    1. transport
    2. network layer
    3. physical layer
    4. Data Link Layer

 

 
   
 

 

 

  1. Remember that the IP datagram may pass through different types of links. For certain types of physical layer connections, it is necessary to further divide the IP datagrams into smaller packets before they are delivered as frames to the data link layer. What are these smaller packets called?
  1. pages
  2. parcels
  3. fragments
  4. scatter grams

 

 

  1. Although IP attempts to route every datagram to its final destination, it is a connectionless, packet switching service. IP is a(n)                      delivery service.
  1. reliable best-effort
  2. unreliable best-effort
  3. reliable and guaranteed
  4. unreliable but guaranteed

 

 

  1. Such network tools as ping and traceroute use the query services of                              to provide the information that they report.
  1. ARP
  2. FTP
  3. ICMP
  4. HTTP

 

 

  1. The purpose of the                                 layer is to take messages from network applications and provide services that support reliable end-to-end communications.
  1. network
  2. physical

 

  1. transport
  2. Data Link

 

 

  1. To identify the network application requesting service, the transport protocol identifies the application that created the message and the application that is to receive the message with
  1. port numbers.
  2. application numbers.
  3. network node numbers.
  4. application address numbers.

 

 

  1. For communication between an application and the transport layer, operating systems provide an interface called a(n)                                , which makes it easy to add a request to the communication services provided by the TCP/IP suite.
  1. socket
  2. named interface
  3. TCP/IP association
  4. service association

 

 

  1. TCP establishes a connection at the request of a network application. To initiate a connection, TCP sends a control packet to TCP at the Web site, requesting a connection; this results in a brief back-and-forth series of requests and acknowledgments known as
  1. binding.
  2. collaborating
  3. handshaking.
  4. service handling.

 

 

  1. A connectionless protocol used instead of TCP for some applications is
  1. user packet protocol.
  2. user segment protocol.
  3. user fragment protocol.
  4. user datagram protocol.

 

 

  1. An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to the network. What is this approach called?
  1. NAT
  2. DHCP
  3. Masking
  4. Dynamic NAT (DNAT)

 

 

  1. What is the abbreviation for the protocol that translates domain names into IP addresses?
  1. NAT
  2. UDP
  3. DNS
  4. DHCP

 

 

  1. Since DNS request packets are simple and small,                                               are used for packet transport.
  1. IP packets
  2. TCP packets
  3. UDP datagrams
  4. Ethernet frames

 

 

  1. Two additional benefits of DNS services are: 1) permits the use of alias names that share the same IP address and 2)                                         .
  1. perform load balancing for replicated servers
  2. perform authentication on requesting computers
  3. lower cost associated with managing IP addresses
  4. enhance performance by caching multiple requests

 

 

  1. In part,                                                      focuses on methods to reserve and prioritize channel capacity to favor packets that require special treatment.
  1. DNS
  2. QoS
  3. TCP/IP
  4. Ethernet

 

 

  1. The variation in delay from packet to packet is known as                                 . It is a particularly important parameter in the transmission of video and audio.
  1. QoS
  2. jitter
  3. packet delay
  4. network delay propagation

 

 

  1. Modern routers, sometimes called                                    , can prioritize and route packets based on the packet class.
  1. QoS routers
  2. Edge routers
  3. Gateway routers
  4. DiffServ capable nodes

 

 

  1. Which of the following is a primary measure to keep the network and system resources intact and free from the results of intrusion?
  1. CAPTCHAs
  2. confidentiality
  3. electronic signatures
  4. limiting physical access to network wiring and network equipment.

 

 

  1. Keeping the content of data traversing the network and information about the communication taking place private is known as
  1. encryption.
  2. authentication.
  3. confidentiality.
  4. nonrepudiation.

 

 

  1. Protecting the content of data communication against changes is known as
  1. integrity.
  2. encryption.
  3. confidentiality.
  4. authentication.

 

 

  1. Using encryption can be helpful in mitigating network security issues except
  1. intrusion.
  2. availability.

 

  1. authentication.
  2. nonrepudiation.

 

 

  1. Reading data in all the packets as they pass through the network is known as
  1. packet sniffing.
  2. switch tapping.
  3. packet spoofing.
  4. packet cracking.

 

 

  1. Symmetric key cryptography requires
  1. two different keys, both private.
  2. the same key be used for both encryption and decryption.
  3. two different keys, one publicly available, and the other private.
  4. the same key be used, one publicly available, and the other private.

 

 

  1. The upper                           layers of the OSI model assume that a successful end-to-end connection is established and maintained at the transport layer. These layers are concerned with the flow of data and control between applications on the communicating nodes.
    1. two
    2. three
    3. four
    4. five

 

 

  1. The dialogue between two cooperating applications or processes at the ends of the communication link on the OSI model is known as a
  1. session.
  2. connection.
  3. communications link.
  4. time-sensitive service.

 

  1. What is the name of the standard that includes the conversion of voice, as well as data, into IP data packets for transmission, as part of the specification?
    1. VOIP
    2. OSI LTE
    3. Long Term Evolution (LTE)
    4. Third generation mobile network

 

 

  1. In cellular technology, the movement of the users from cell to cell is called a
    1. handoff.
    2. handover.
    3. cell transfer.
    4. next cell transfer.

 

 

  1. MPLS operates at the                                     layer.
    1. network
    2. data link
    3. transport
    4. application

 

Option 1

Low Cost Option
Download this past answer in few clicks

7.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE